Skip to main content

About your Search

Search Results 0 to 2 of about 3
.a. from yale law school. steve chabinsky is senior vice president of legal affairs general counsel and chief risk officer of the international technology firm crowd strike. he's also an adjunct faculty member at george washington university and the cyber columnist for "security" magazine. prior to joining crowd strike, steve was at the fbi for 17 years, culminating in his service as deputy assistant director in the fbi's cyber division. prior to that, he organized and led the fbi's cyber intelligence program. he's also served in the office of director of national intelligence. he's a graduate of duke university and duke law school. laura donohue is a professor of law at georgetown law and director of georgetown center on national security and the law. she writes on national security and counterterrorism law in the united states and the united kingdom, including on emerging technologies. professor donohue has held fellowships at stanford law school center for constitutional law, stanford university center for international security and cooperation and harvard university's john f. ke
services. mr. todd park is the chief technology aufrgs ot united states. mr. steve van rokel is the chief information officer of the united states. okay. and pursuant to the rules, as many of you have not been here before to see, i'd ask that you all rise to take a sworn oath. please raise your right hands. do you solemnly swear or affirm that the testimony you're about to give will be the truth, the whole truth and nothing but the truth. let the record -- please be seated. >>> let the record reflect that all witnesses answered in the affirmative. this is a large panel and it's sfoing to be a long day. i suspect witnesses will be asked questions by both sides of the aisle. i would ask that you adhere to the time clock and come to a halt as quickly as possible when it hits red. please, understand, yellow is not an opportunity to start a new subject. it is an opportunity to wrap up. and with that, we'll go to our distinguished guests. >> we appreciate the opportunity to help uncover complex it ak wi zigtss. and now, we are faced with more visible projects. these complex projects can be deli
a little more specific on what the private sector should be able to do, and maybe steve you or anyone else jump in on this. there's been a lot of discussion of active defense, of actions that the private sector could do in its own infrastructure, honey pots, et cetera or moving outside of its infrastructure to try to get back its data. is this part of what you're talking about as greater private sector role in deterrence, and i guess from others, are there reactions to that specifically? >> first i would like to say there is the playbook for cyber events. some of these issues are discussed there and in a way that is very even-handed to address the issues. >> steve saved us by holding it up. >> i have no financial interest in this. i actually can say that. a very good compendium. i would rather start on the highest end of that question where the private sector should be and touch on the comments i made earlier, which again would require a sort of paradigm shift. a paradigm shift in which we try to realize that the internet and technologies from a security perspective have differential that
Search Results 0 to 2 of about 3